Help Center/ SecMaster/ User Guide/ Threats/ Incidents/ Adding and Editing an Incident
Updated on 2025-08-11 GMT+08:00

Adding and Editing an Incident

Scenarios

This section describes how to add or edit an incident.

  • Adding an incident: If you identify an attack or a fault that needs to be handled, you can add an incident for tracking and handling the attack or fault.
  • Editing an incident: If information such as the incident status, severity, and owner changes, you can edit the incident accordingly.

Adding an Incident

  1. Log in to the SecMaster console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. Click in the upper left corner of the page and choose Security & Compliance > SecMaster.
  4. In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.

    Figure 1 Workspace management page

  5. In the navigation pane on the left, choose Threats > Incidents.

    Figure 2 Accessing the Incidents page

  6. On the Incidents page, click Add. On the displayed Add page, set parameters as described in Table 1.

    Table 1 Parameters for adding an incident

    Parameter

    Description

    Basic Information

    Incident Name

    Custom incident name. The value must contain:

    • Only uppercase letters, lowercase letters, digits, and the special characters: -_ ()
    • A maximum of 2,550 characters

    Type

    Select an incident type from the drop-down list.

    (Optional) Service ID

    Enter the service ID corresponding to the incident.

    Incident Severity

    Select a severity level.

    The options are Critical, High, Medium, Low, and Informational.

    Status

    Select an incident status.

    The options are Open, Blocked, and Closed.

    • Open: Select Open if the incident has not been handled or the fault still exists.
    • Blocked: Select Blocked if the incident cannot be handled or resolved due to a specific reason.
    • Closed: Select Closed if the incident has been handled, the issue has been resolved, or the fault no longer exists.

    (Optional) Owner

    Primary owner of the incident.

    Data Source Product Name

    Select the name of the data source product.

    Data Source Type

    Select a data source type. For example, if the source is a cloud service, select Cloud Service.

    Timeline

    First Occurrence Time

    Configure the time when the incident occurred for the first time.

    (Optional) Last Occurrence Time

    Configure the time when the incident occurred last time.

    (Optional) Planned Closure Time

    Time to close the incident.

    Other

    (Optional) Verification Status

    Verification status of the incident to identify the accuracy of the incident.

    • Unknown: It is unclear whether the incident may lead to an attack.
    • Attack succeeded: The incident was triggered by a successful attack.
    • Attack failed: The incident was triggered by a failed attack.

    (Optional) Stage

    Select the incident phase.

    • Preparation: Prepare resources to process incidents.
    • Detection and analysis: Detect and analyze the cause of an incident.
    • Containment, extradition, and recovery: Handle an incident.
    • Post Incident Activity: Follow-up activities.

    (Optional) Debugging data

    Whether to enable simulated debugging

    (Optional) Labels

    Label of the incident. For example, "mining pool", "External connection." Use commas (,) to separate multiple labels.

    Description

    Incident description. The value can contain:

    • Only uppercase letters, lowercase letters, digits, and the special characters: -_ ()
    • A maximum of 10,240 characters.

  7. Click OK. You can check the added incident by referring to Viewing Incidents. Path: In the navigation pane on the left, choose Threats > Incidents.

Editing an Incident

  1. Log in to the SecMaster console.
  2. Click in the upper left corner of the management console and select a region or project.
  3. Click in the upper left corner of the page and choose Security & Compliance > SecMaster.
  4. In the navigation pane on the left, choose Workspaces > Management. In the workspace list, click the name of the target workspace.

    Figure 3 Workspace management page

  5. In the navigation pane on the left, choose Threats > Incidents.

    Figure 4 Accessing the Incidents page

  6. In the incident list, locate the row that contains the target incident and click Edit in the Operation column.
  7. On the Edit page that is displayed, edit incident parameters.

    Table 2 Parameters for editing an incident

    Parameter

    Description

    Basic Information

    Incident Name

    Custom incident name. The value must contain:

    • Only uppercase letters, lowercase letters, digits, and the special characters: -_ ()
    • A maximum of 2,550 characters

    Incident Type

    Incident type

    (Optional) Service ID

    Enter the service ID corresponding to the incident.

    Incident Level

    Select a severity level. The options are Critical, High, Medium, Low, and Informational.

    Status

    Select an incident status.

    The options are Open, Blocked, and Closed.

    • Open: Select Open if the incident has not been handled or the fault still exists.
    • Blocked: Select Blocked if the incident cannot be handled or resolved due to a specific reason.
    • Closed: Select Closed if the incident has been handled, the issue has been resolved, or the fault no longer exists.

    (Optional) Owner

    Primary owner of the incident.

    Data Source Name

    Name of the data source, which cannot be changed

    Data Source Type

    Type of the data source, which cannot be changed

    Timeline

    First Occurrence Time

    Time when the incident occurred for the first time.

    (Optional) Last Occurrence Time

    Time when the incident occurred last time.

    (Optional) Planned Closure Time

    Time to close the incident.

    Other

    (Optional) Verification Status

    Verification status of the incident to identify the accuracy of the incident.

    • Unknown: It is unclear whether the incident may lead to an attack.
    • Attack succeeded: The incident was triggered by a successful attack.
    • Attack failed: The incident was triggered by a failed attack.

    (Optional) Phase

    Incident phase.

    • Preparation: Prepare resources to process incidents.
    • Detection and analysis: Detect and analyze the cause of an incident.
    • Contain, extradition, and recovery: Handle an incident.
    • Post Incident Activity: Follow-up activities.

    (Optional) Debugging data

    Whether to enable simulated debugging. This parameter cannot be modified once configured.

    (Optional) Label

    Label of the incident. For example, "mining pool", "External connection." Use commas (,) to separate multiple labels.

    Description

    Incident description. The value can contain:

    • Only uppercase letters, lowercase letters, digits, and the special characters: -_ ()
    • A maximum of 10,240 characters.

  8. Click OK. The incident editing is complete. You can check the incident details by referring to Viewing Incidents. Path: In the navigation pane on the left, choose Threats > Incidents.

Related Operations